Which key terrain




















The amount of items that will be exported is indicated in the bubble next to export format. Export the current results of the search query as a citation list. Select one of the available citation styles, or add a new one using the "Citations format" option present in the "My account" section.

Export the current item as a citation. Thesis and Dissertation Collection, all items View Item. JavaScript is disabled for your browser. Some features of this site may not work without it. Login Register. Key terrain: application to the layers of cyberspace.

Oliver British. Wendy British. Fred US English. Tessa South African. How to say key terrain in sign language? Numerology Chaldean Numerology The numerical value of key terrain in Chaldean Numerology is: 1 Pythagorean Numerology The numerical value of key terrain in Pythagorean Numerology is: 9. Select another language:. Please enter your email address: Subscribe. Discuss these key terrain definitions with the community: 0 Comments.

Notify me of new comments via email. Cancel Report. Create a new account. Volume 7. Volume 6. Volume 5. Volume 4. Volume 3. Volume 2. Volume 1. ISC 2. Advanced Persistent Threat. Advanced Persistent Threats. Analogue Network Security. Anticipatory Cyber Defence. Applications of Intelligence. Artificial Intelligence AI. Authorization Based Access Control. Automated Response Action. Bayesian-Nash Equilibrium.

Business Process Modeling Notation. Byzantine Generals Playing Evolutionary Games. Cache-Timing Countermeasures. Capability Maturity Model.

Charter of the United Nations. Commercial Solutions for Classified. Comprehensive Approach CA. Computational Intelligence. Computer Network Operations Development Program. Contested Cyber Environment. Continuous Identity Verification.

Coordinated Response Action. Critical Cyber Infrastructure. Critical Discourse Analysis. Critical Information Infrastructure.

Critical Information Infrastructure Protection. Critical Infrastructure Protection. Critical Infrastructure Protection and Modelling. Critical National Infrastructure. Cross-border Stored Electronic Evidence. Cyber Counterintelligence. Cyber Information Sharing.

Cyber Intelligence Analysis. Cyber Intelligence Support. Cyber Offensive and Defensive Capability. Cyber Operations other than War. Cyber Operations Planning. Cyber Operations Training. Cyber Situational Awareness. The value of terrain in support of defensive and offensive military operations has been known for millennia 1. In a defensive context, for example, narrow ingress passageways can be used to mitigate a force with superior numbers.

From an offensive perspective, avoiding terrain that hampers movement and using land features to protect your flank can significantly improve mission success [2]. The ability to identify such terrain features within the operational environment allows commanders to more effectively plan and tailor their efforts.

To simplify some of the complexities of cyberspace, we attempt to make analogies to the physical world that allow us to apply familiar doctrinal processes.

This is relatively intuitive given that terrain that is advantageous to one side for some operational scenario is obviously a disadvantage to the other. Another agreed upon attribute is that its value is temporal; coupled with the duration of a mission. For instance, fighting from an elevated position high ground is beneficial for a number of reasons.

Holding higher ground provides an elevated vantage point with a wider field of view. Soldiers fighting uphill will move more slowly and tire more quickly, and so forth. However, depending on the timeframe, seizing the high ground is not always advantageous.

When executing a certain military operation, only portions of this virtual domain will be important or advantageous; changing over time based on mission timespan or as the mission evolves. How do we identify what aspects are advantageous in support of a specific mission? Defining a mission too broadly, e. Conversely, define a mission too granularly e.

These open questions are further complicated by the fact that warfare within the Cyberspace Domain has undeniable dissimilarities from the more traditional physical domains of land, maritime, air and space [6] [7]. These include: differences in what constitutes terrain and associated fundamental properties, inconsistences in definitions, challenges pertaining to the visualization and understanding of cyberspace, incongruence in the identification of mission critical systems vs. Surprisingly, not much has been written on this topic.

Most existing literature seems to operate on the assumption that cyberspace terrain is simply the systems, devices, software and interconnections that constitute cyberspace itself. Raymond et all [4] are among the few that attempt to provide a formal definition:. This characterization seems to follow the philosophy that terrain within cyberspace is basically anything and everything that makes up, or is a part of, the domain. Comparing these two definitions, one can already see some significant differences.

Within the physical world, terrain is a finite subset of the domain. For instance, there is a clear differentiation between what is a terrain feature vs. Within cyberspace, this distinction no longer exists.

The ability to easily differentiate between terrain features vs. The provided definition even includes cyber personas, in essence encapsulating virtual individuals as part of the terrain landscape. These can include such things as physical and transport layer infrastructure e. Domain Name Service , to name a few [3] [4]. Both approaches are limited in their usefulness [7]. Physical terrain does not in itself provide a capability.

It provides military advantage, enhancing the effectiveness of capabilities you already possess, or tactics you employ. Terrain features in the physical world have intrinsic properties that are well defined and understood. Mountains and swamps are hard to cross, dense vegetation provides obscurance, and hilltops provide a better field of view.

Each of these properties is immutable. Their value to a military operation is only dependent on their geographical position relative to the intent and duration of a particular mission. It can be argued that certain devices or services within cyberspace provide functions that imbues them with some fundamental characteristics that are comparable to the examples provided above.



0コメント

  • 1000 / 1000